CN112989310B - Information processing method, computer equipment and readable storage medium - Google Patents

Information processing method, computer equipment and readable storage medium Download PDF

Info

Publication number
CN112989310B
CN112989310B CN202110363576.4A CN202110363576A CN112989310B CN 112989310 B CN112989310 B CN 112989310B CN 202110363576 A CN202110363576 A CN 202110363576A CN 112989310 B CN112989310 B CN 112989310B
Authority
CN
China
Prior art keywords
user
information
cluster
terminal
electronic tag
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110363576.4A
Other languages
Chinese (zh)
Other versions
CN112989310A (en
Inventor
周先平
郑磊
郑中
王炼
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Tencent Information Technology Co Ltd
Original Assignee
Shenzhen Tencent Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Tencent Information Technology Co Ltd filed Critical Shenzhen Tencent Information Technology Co Ltd
Priority to CN202110363576.4A priority Critical patent/CN112989310B/en
Publication of CN112989310A publication Critical patent/CN112989310A/en
Application granted granted Critical
Publication of CN112989310B publication Critical patent/CN112989310B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0029Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the application discloses an information processing method, an information processing device, computer equipment and a readable storage medium, wherein the method comprises the following steps: when an electronic tag is sensed in a target range, acquiring user cluster information transmitted by the electronic tag through tag current; the electronic tag is generated based on the user cluster information; displaying the user cluster information, and responding to a confirmation operation aiming at the user cluster information to acquire user identity information of a first user; and sending the user identity information of the first user to a target server, so that the target server adds the first user to a user cluster corresponding to the user cluster information after the user identity information of the first user passes verification. By adopting the embodiment of the application, the safety of information processing can be improved.

Description

Information processing method, computer equipment and readable storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to an information processing method, an information processing device, a computer device, and a readable storage medium.
Background
Currently, more and more users use terminal devices for entertainment operations, such as playing games, watching video, listening to music, etc., at leisure. However, for some groups, such as students or members of institutions, overuse of terminal devices for entertainment operations can affect the academic or work efficiency. Therefore, a related manager such as a teacher or an organization manager needs to view and manage the information of the length of time for which the user performs entertainment operation.
In the prior art, a related manager applies for the organization cluster information related to the organization information on a management platform, and members search the organization cluster information by logging in the related platform and realize the binding with the organization cluster information on the platform. However, the malicious user can set himself as a related manager, apply for the mechanism cluster information related to the mechanism on the platform by using the mechanism cluster information, and after the member binds with the mechanism cluster information applied by the malicious user, the member information will be revealed, so how to improve the security of information processing is a problem to be solved urgently.
Disclosure of Invention
The embodiment of the application provides an information processing method, computer equipment and a readable storage medium, which can improve the safety of information processing.
An aspect of an embodiment of the present application provides an information processing method, including:
When an electronic tag is sensed in a target range, acquiring user cluster information transmitted by the electronic tag through tag current; the electronic tag is generated based on the user cluster information;
displaying the user cluster information, and responding to a confirmation operation aiming at the user cluster information to acquire user identity information of a first user;
and sending the user identity information of the first user to a target server, so that the target server adds the first user to a user cluster corresponding to the user cluster information after the user identity information of the first user passes verification.
In one aspect, an embodiment of the present application provides another information processing method, including:
Receiving user identity information of a first user sent by a first terminal; the user identity information of the first user is obtained by the first terminal in response to a confirmation operation for user cluster information, and the user cluster information is obtained based on tag current generated by the electronic tag when the first terminal senses the electronic tag in a target range; the electronic tag is generated based on the user cluster information;
Carrying out identity verification on the user identity information of the first user;
if the user identity information of the first user passes the verification, the first user is added to the user cluster corresponding to the user cluster information.
An aspect of an embodiment of the present application provides an information processing apparatus, including:
the tag induction module is used for acquiring user cluster information transmitted by the electronic tag through tag current when the electronic tag is induced in a target range; the electronic tag is generated based on the user cluster information;
The information acquisition module is used for displaying the user cluster information and responding to the confirmation operation aiming at the user cluster information to acquire the user identity information of the first user;
the information sending module is used for sending the user identity information of the first user to the target server so that the target server can add the first user to the user cluster corresponding to the user cluster information after the user identity information of the first user passes verification.
Optionally, the tag sensing module includes:
A current generation unit for generating an induced current so that the electronic tag generates a tag current based on the induced current;
And the information decoding unit is used for receiving the tag signal transmitted by the electronic tag through the tag current, and decoding the tag signal to obtain the user cluster information.
Optionally, the apparatus further comprises:
the record acquisition module is used for acquiring a historical operation record of the first user aiming at a target application in a target time period after the first user is added to a user cluster corresponding to the user cluster information; the history operation record comprises history login time and continuous use time;
The record sending module is used for sending the history operation record to the second terminal if the continuous use time is longer than a first time threshold and the history login time is longer than a second time threshold; the second user associated with the second terminal belongs to the user cluster.
An aspect of an embodiment of the present application provides another information processing apparatus, including:
The information receiving module is used for receiving user identity information of a first user sent by the first terminal; the user identity information of the first user is obtained by the first terminal in response to a confirmation operation for user cluster information, and the user cluster information is obtained based on tag current generated by the electronic tag when the first terminal senses the electronic tag in a target range; the electronic tag is generated based on the user cluster information;
The identity verification module is used for carrying out identity verification on the user identity information of the first user;
And the information adding module is used for adding the first user to the user cluster corresponding to the user cluster information if the user identity information of the first user passes the verification.
Optionally, the apparatus further comprises:
The request acquisition module is used for acquiring a user cluster creation request sent by the second terminal and acquiring a key pair associated with the user cluster creation request; the key pair comprises a private key, and the user cluster creation request comprises the user cluster information;
The signature generation module is used for generating a cluster signature of the user cluster information by adopting the private key;
The signature sending module is used for sending the user cluster information and the cluster signature of the user cluster information to the tag management terminal so that the tag management terminal can check the user cluster information based on the cluster signature, and after the user cluster information passes the check, the electronic tag is output based on the user cluster information.
Optionally, the signature sending module includes:
The information coding unit is used for coding the user cluster information to generate a cluster information code;
The code sending unit is used for generating a logic code according to the cluster information code, sending the logic code to the tag management terminal so that the tag management terminal writes the logic code into an initial tag and outputs the electronic tag; the electronic tag includes the user cluster information.
Optionally, the identity verification module includes:
The identity traversing unit is used for acquiring a user set included in the user cluster and traversing the user set; the user set comprises one or at least two cluster users and user identity information of each cluster user;
And the verification passing unit is used for determining that the user identity information of the first user passes the verification if the user identity information of the first user is not found in the user identity information corresponding to the one or at least two cluster users respectively.
Optionally, the apparatus further includes a verification anomaly module, the verification anomaly module including:
A verification failure unit, configured to determine that the user identity information of the first user is not verified if the user identity information of the first user is found in the user identity information corresponding to the one or at least two clustered users respectively;
The information generation unit is used for generating user identity abnormal information; the user identity abnormality information is used for indicating that the first user belongs to the user cluster;
And the abnormality transmitting unit is used for transmitting the user identity abnormality information to the first terminal so that the first terminal transmits an identity verification request based on the user identity abnormality information.
In one aspect, the application provides a computer device comprising: a processor, a memory, a network interface;
The processor is connected to a memory for providing data communication functions, a network interface for storing a computer program, and for calling the computer program to cause a computer device comprising the processor to perform the method.
In one aspect, embodiments of the present application provide a computer-readable storage medium having a computer program stored therein, the computer program being adapted to be loaded and executed by a processor to cause a computer device having the processor to perform the above-described method.
In one aspect, embodiments of the present application provide a computer program product or computer program comprising computer instructions stored in a computer-readable storage medium. The computer instructions are read from the computer-readable storage medium by a processor of a computer device, and executed by the processor, cause the computer device to perform the methods provided in the various alternatives in an aspect of the embodiments of the application.
In the embodiment of the application, the electronic tag is sensed in the target range, namely the electronic tag is sensed in a short distance, so that the authenticity of the second user corresponding to the electronic tag can be determined, the second user corresponding to the electronic tag is prevented from being a malicious user, when the user identity information of the first user is sent to the target server in the follow-up process, the target server adds the first user to the user cluster corresponding to the user cluster information after the user identity information of the first user is verified, and the accuracy of the added user identity information can be ensured. In addition, because the electronic tag is a close-range induction electronic tag, the electronic tag is generally arranged at a position which can be seen by a second user, for example, the electronic tag is arranged at a position which is associated with a second terminal, for example, the electronic tag is stuck on the second terminal, so that the user can check the other side face to face, the malicious user can be prevented from forging the electronic tag and inducing the first user to join, the leakage of user identity information is caused, and the safety of information processing is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic diagram of an information processing system according to an embodiment of the present application;
fig. 2 is a schematic diagram of an application scenario of an information processing method according to an embodiment of the present application;
FIG. 3 is a schematic flow chart of an information processing method according to an embodiment of the present application;
fig. 4 is a schematic view of a scenario for obtaining user identity information according to an embodiment of the present application;
Fig. 5 is a schematic flow chart of joining a user cluster according to an embodiment of the present application;
FIG. 6 is a flowchart of another information processing method according to an embodiment of the present application;
fig. 7 is a schematic flow chart of establishing user cluster information according to an embodiment of the present application;
Fig. 8 is a schematic diagram of a composition structure of an information processing apparatus according to an embodiment of the present application;
Fig. 9 is a schematic diagram of a composition structure of another information processing apparatus provided in an embodiment of the present application;
fig. 10 is a schematic diagram of a composition structure of a computer device according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
Referring to fig. 1, fig. 1 is a schematic architecture diagram of an information processing system according to an embodiment of the present application, where the embodiment of the present application may be implemented by a computer device. The information processing system can comprise at least two computer devices, a target server and the like, wherein each computer device can perform data interaction through the target server, and the target server is a server corresponding to an application program.
As shown in fig. 1, information interaction may be performed between each computer device (such as the first terminal 11 and the second terminal 13) based on the target server 12, and the execution subject of the embodiment of the present application may be any one of at least two computer devices. Taking the first terminal 11 as an example, when the first terminal 11 senses the electronic tag 14 associated with the second terminal 13 within the target range, for example, the electronic tag 14 may be attached to the second terminal 13, and the first terminal 11 may sense the electronic tag 14 by performing close-range sensing with the second terminal 13, so as to obtain user cluster information transmitted by the electronic tag 14 through tag current. Further, the first terminal 11 displays the user cluster information, the first user may trigger a confirmation operation for the user cluster information on the first terminal 11, and the first terminal 11 obtains the user identity information of the first user in response to the confirmation operation. Further, the first terminal 11 sends the user identity information of the first user to the target server 12, the target server 12 verifies the user identity information of the first user, and after the verification is passed, the target server 12 adds the first user to the user cluster corresponding to the user cluster information. The end user corresponding to the first terminal 11 may be referred to as a first user, and the end user corresponding to the second terminal 13 may be referred to as a second user. The number of the first terminals 11 may be one or more, and the number of the second terminals 13 may be one or more.
Because the electronic tag is sensed in the target range, namely the electronic tag is sensed in a short distance, the electronic tag is generally arranged at a position which can be seen by a second user, for example, the electronic tag is arranged at a position associated with a second terminal, for example, the electronic tag is stuck on the second terminal, so that the user can check the other side face to face, the malicious user can be prevented from forging the electronic tag and inducing the first user to join, the leakage of user identity information is caused, and the safety of information processing is improved. And when the user identity information of the first user is sent to the target server in the follow-up process, the target server adds the first user to the user cluster corresponding to the user cluster information after the user identity information of the first user is verified, so that the accuracy of the added user identity information can be ensured.
It is understood that the computer devices mentioned in the embodiments of the present application include, but are not limited to, terminal devices or servers. In other words, the computer device or the terminal may be a server or a terminal device, or may be a system formed by the server and the terminal device. The above-mentioned terminal device may be an electronic device, including, but not limited to, a mobile phone, a tablet computer, a desktop computer, a notebook computer, a palm computer, a vehicle-mounted device, an augmented reality/virtual reality (AR/VR) device, a head-mounted display, a wearable device, a smart speaker, a digital camera, a camera, and other mobile internet devices (mobile INTERNET DEVICE, MID) with network access capability. The servers mentioned above may be independent physical servers, or may be server clusters or distributed systems formed by a plurality of physical servers, or may be cloud servers that provide cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communication, middleware services, domain name services, security services, vehicle-road collaboration, content distribution networks (Content Delivery Network, CDN), and basic cloud computing services such as big data and artificial intelligence platforms.
Further, referring to fig. 2, fig. 2 is a schematic application scenario diagram of an information processing method according to an embodiment of the present application. As shown in fig. 2, when the first terminal 21 senses the electronic tag 22 within the target range, the coil in the first terminal 21 generates a magnetic field such that a tag current is generated in the electronic tag 22 in the magnetic field; the first terminal 21 senses a tag current generated by the electronic tag 22 and obtains a tag signal based on the tag current; the first terminal 21 receives the tag signal and performs decoding processing to obtain user cluster information, where the first terminal 21 may display the user cluster information 23, and the user cluster information 23 may include "join XX middle school XX class management", for example. The first terminal 21 may also display a "ok" button, etc., and the first user triggers a confirmation operation of the first terminal 21 for the user cluster information by clicking the "ok" button, and the first terminal 21 obtains the user identity information 24 of the first user in response to the confirmation operation for the user cluster information, where the user identity information of the first user may include a name, a gender, a number, etc. of the first user; the first terminal 21 sends the user identity information 24 of the first user to the target server 25, and the target server 25 verifies the user identity information 24 of the first user; if the verification is passed, the target server 25 adds the first user to the user cluster corresponding to the user cluster information. If the authentication is not passed, the target server 25 generates user identity abnormality information and transmits the user identity abnormality information to the first terminal 21, and the first terminal 21 transmits an identity verification request to the target server 25 based on the user identity abnormality information to perform identity verification.
Further, referring to fig. 3, fig. 3 is a schematic flow chart of an information processing method according to an embodiment of the present application, where the information processing method may be applied to a first terminal side; as shown in fig. 3, the method comprises the steps of:
S101, when the electronic tag is sensed in the target range, acquiring user cluster information transmitted by the electronic tag through tag current.
In the embodiment of the application, when the first user holds the first terminal to sense the electronic tag in the target range where the electronic tag is located, for example, the first terminal can sense and even touch the electronic tag in a short distance, so that the first terminal senses the electronic tag and acquires the user cluster information transmitted by the electronic tag through the tag current. The target range refers to a distance range in which the electronic tag can be sensed. The electronic tag is generated based on the user cluster information, that is, the electronic tag stores the user cluster information, or a user cluster identifier corresponding to the user cluster information, where the user cluster identifier is an identifier for uniquely indicating the user cluster information, and the user cluster identifier may include a website corresponding to a webpage where the user cluster information is indicated to be logged in, that is, the user cluster identifier may enter the webpage where the user cluster information is located by logging in the website. The target range may be determined according to the type of the electronic tag, for example, the electronic tag is a tag based on Near Field Communication (NFC) technology, and the target range may be less than or equal to 10 cm; or the electronic tag can also be a tag based on Bluetooth technology or non-contact Radio Frequency Identification (RFID) technology, and the corresponding target range belongs to the transmission range of Bluetooth or RFID. The first user refers to a user with a first terminal, and the first user can be determined according to a specific application scene, for example, in an application scene based on management of student information of students by a teacher, and can refer to the students; or in an application scenario in which member information of an organization member is managed based on an organization manager, the first user may refer to the organization member of the organization. The user cluster information may include an organization name, organization manager information, organization identification information corresponding to the organization, and so on. For example, when an organization refers to school, user cluster information may include school name, class teacher name, class number, and so forth.
Optionally, when the first terminal senses the electronic tag in the target range, generating an induction current, so that the electronic tag generates a tag current based on the induction current; the first terminal receives a tag signal transmitted by the electronic tag through tag current, and decodes the tag signal to obtain user cluster information. Specifically, when the first terminal senses the electronic tag in the target range, a coil in the first terminal generates a magnetic field, so that the coil in the electronic tag generates tag current for normal operation of the electronic tag in the magnetic field; the first terminal can sense the tag current generated by the electronic tag, receive the tag signal transmitted by the electronic tag through the tag current, receive the tag signal, and decode the tag signal to obtain the user cluster information.
S102, displaying user cluster information, and responding to a confirmation operation aiming at the user cluster information to acquire user identity information of a first user.
In the embodiment of the application, the first terminal receives the user cluster information and can display the user cluster information, the first user can check the user cluster information through the first terminal, and when the user cluster information is determined to be correct, for example, the first user belongs to students in the class, the user cluster information is considered to be correct, so that the first user can trigger a confirmation operation for the user cluster information on the first terminal, specifically can click a confirmation button or a button on the first terminal, and when the first terminal acquires the confirmation operation for the first user, the first terminal can respond to the confirmation operation for the user cluster information and acquire the user identity information of the first user. Specifically, the first terminal may obtain the user identity information of the first user from the account registration information by obtaining account registration information associated with the application program on the first terminal. Or after the first terminal displays the user cluster information, the first terminal can prompt the first user to input the user identity information of the first user, so as to acquire the user identity information of the first user. The user identity information of the first user may include a name, a gender, a number, and the like of the first user, and the number may refer to a study number or an employee number.
Optionally, referring to fig. 4, fig. 4 is a schematic view of a scenario for obtaining user identity information according to an embodiment of the present application; as shown in fig. 4, the first terminal displays user cluster information through a terminal display interface, where the user cluster information may include "join XX middle school XX class management". The 'determination' button can be displayed in a display interface of the first terminal, the first user triggers a confirmation operation of the first terminal for the user cluster information by clicking the 'determination' button, the first terminal responds to the confirmation operation to acquire user identity information of the first user, and the user identity information of the first user can comprise the name, the gender, the number and the like of the first user. Optionally, the first user may trigger a "modify" button in the first terminal display interface to trigger a modification operation to modify the user identity information of the first user. Further, the first user may trigger a "ok" button in the display interface of the first terminal to trigger a confirmation operation, and then the first terminal obtains the user identity information of the modified first user. Because the first user can modify the user identity information, the accuracy of acquiring the user identity information can be improved.
And S103, the user identity information of the first user is sent to the target server, so that the target server adds the first user to the user cluster corresponding to the user cluster information after the user identity information of the first user is verified.
In the embodiment of the application, the first terminal sends the identity information of the first user to the target server, and the target server can verify the user identity information of the first user, for example, verify whether the first user repeatedly joins the user cluster, and after the user identity information is verified, for example, under the condition that the first user does not repeatedly join the user cluster, the target server adds the first user to the user cluster corresponding to the user cluster information. Wherein the user cluster comprises already joined users, the number of members in the user cluster is variable, and when a user joins the user cluster, the number of members in the user cluster increases by one. Optionally, when a user exits the user cluster, the number of members in the user cluster is reduced by one.
Optionally, after the first user is added to the user cluster corresponding to the user cluster information, the first terminal may obtain a history operation record of the first user for the target application, so as to manage the first user based on the history operation record. Specifically, the first terminal may obtain a history operation record of the first user for the target application in the target time period; if the continuous use time length is greater than the first time length threshold value and the historical login time length is greater than the second time length threshold value, the first terminal sends the historical operation record to the second terminal. The historical operation record can comprise historical login duration, continuous use duration and the like; the second user associated with the second terminal belongs to the user cluster. Wherein the first user associated with the first terminal and the second user associated with the second terminal may belong to different user categories. For example, a user category to which a first user belongs is referred to as a first user category, and a user category to which a second user belongs is referred to as a second user category, and the authority of the user corresponding to the second user category is greater than the authority of the user corresponding to the first user category. For example, the first user is a student, the second user is a teacher, and the second user can manage data generated by the first user in learning and the like. For example, the first user may be a member of an organization, the second user may be an organization manager, the second user may manage data generated by the first user in terms of work, etc. In other words, the second user and the first user may be added to the same user cluster in which the second user may manage the first user.
The target time period may be determined according to specific situations, for example, the target time period may include all time periods within a default history period (such as a previous week) of the first terminal sensing the electronic tag. Or the target time period may be determined from a first user's schedule of work and rest. For example, if the first user is a student, the work and rest schedule may include a schedule time, a rest time, and the like of the first user. If the first user is a member of the organization, the work and rest schedule may include a work time, a rest time, and the like of the first user. Taking a first user as an example, the first terminal can determine a target time period by acquiring a work and rest time table (such as a class time table and a rest time table) of the first user, and can determine whether the first user operates on the target application in a lesson or sleeping time period when a history operation record of the target application is acquired later, so that the login condition of the target application of the first user can be managed. If the first terminal is a terminal used by a student, the second terminal may be a terminal used by a teacher, and the second user may be a teacher. The target application may be a certain game application or audio/video application, or may be a plurality of game applications or audio/video applications. The historical login duration may be determined according to the time of the first user logging in the target application and the time of logging out of the target application, for example, the time interval between the time of the first user logging in the target application and the time of logging out of the target application may be determined first, and then the sum of the time intervals of the first user logging in the target application may be determined to determine the historical login duration. The continuous use duration may also be determined according to the time of each login of the first user to the target application and the time of exiting the target application.
Optionally, the history of the target application may include a history of the target application in the first terminal, and may further include a history of the target application on other terminals associated with the user identity information of the first user. For example, the first user may log in the target application using the first terminal a and the first terminal b, respectively, in different time periods, and thus, by acquiring the history of the operation for the target application on the terminal associated with the identity information of the first user, the accuracy of acquiring the history of the operation for the target application may be improved.
In the specific implementation, the first terminal obtains a historical operation record of the first user aiming at the target application in the target time period, namely, obtains the historical login time length, continuous use time length and the like of the first user aiming at the target application in the target time period, and if the continuous use time length is larger than a first time length threshold value, the first terminal indicates that the time length of the first user logging in the target application for a certain time is larger than the first time length threshold value; and if the historical login time is longer than the second time threshold, indicating that the sum of the historical continuous use time of the first user for the target application in the target time period is longer than the second time threshold. When the continuous use time is longer than the first time threshold and the historical login time is longer than the second time threshold, the first user can be considered to operate the target application, the target application is used for a long time, the historical operation record is sent to the second terminal, and the second user corresponding to the second terminal can manage the first user. If the continuous use time length is smaller than the first time length threshold value or the historical login time length is smaller than the second time length threshold value, the first user logs in the target application in the target time period, but the target application is withdrawn from the operation, so that the historical operation record can be not transmitted to the second terminal, the first terminal screens the historical operation record of the user and transmits the historical operation record meeting the conditions to the second terminal, the efficiency of the second user for checking the historical operation record through the second terminal can be reduced, and the management of the first user is facilitated.
Alternatively, a history of the first user in the target period may be obtained, where the history includes a history login duration, a continuous use duration, an abnormal use duration of an abnormal period, and the like, where the abnormal period may be considered as a period in which the first user should not use the target application. For example, when the first user is a student, the abnormal time period may include a lesson time of the first user, etc., and when the first user is a member of an organization, the abnormal time period may include a work time of the first user, etc. When the abnormal use time length of the first user in the abnormal time period is smaller than the first time length threshold value, even if the continuous use time length is smaller than the first time length threshold value or the historical login time length is smaller than the second time length threshold value, the first terminal can send the historical operation record to the second terminal, and because the first user logs in the target application in the lesson time period or the working time period, even if the first user exits from the target application without operation, the historical operation record can be sent to the second terminal, so that the accuracy of the second terminal for obtaining the historical operation record is improved, and the first user can be managed in a targeted mode.
Optionally, a schematic flow chart of a user cluster corresponding to user cluster information added by a first user corresponding to a first terminal may be shown in fig. 5, and fig. 5 is a schematic flow chart of user cluster adding provided in an embodiment of the present application, where the method includes the following steps:
s201, the first terminal senses the electronic tag in the target range.
S202, the electronic tag transmits user cluster information to the first terminal.
S203, the first terminal displays the user cluster information, and responds to the confirmation operation aiming at the user cluster information to acquire the user identity information of the first user.
S204, the first terminal sends the user identity information of the first user to the target server.
S205, the target server verifies the user identity information of the first user, and after the user identity information passes the verification, the first user is added to the user cluster corresponding to the user cluster information.
In the embodiment of the application, when an electronic tag is sensed in a target range, user cluster information transmitted by the electronic tag through tag current is acquired; the electronic tag is generated based on the user cluster information; displaying the user cluster information, and responding to a confirmation operation aiming at the user cluster information to acquire user identity information of a first user; and sending the user identity information of the first user to a target server, so that the target server adds the first user to a user cluster corresponding to the user cluster information after the user identity information of the first user passes verification. The electronic tag is sensed in the target range, namely the electronic tag is sensed in a short distance, so that the authenticity of the second user corresponding to the electronic tag can be determined, the second user corresponding to the electronic tag is prevented from being a malicious user, when the user identity information of the first user is subsequently sent to the target server, the target server adds the first user to the user cluster corresponding to the user cluster information after the user identity information of the first user is verified, and the accuracy of the added user identity information can be ensured. In addition, because the electronic tag is a close-range induction electronic tag, the electronic tag is generally arranged at a position which can be seen by a second user, for example, the electronic tag is arranged at a position which is associated with a second terminal, for example, the electronic tag is stuck on the second terminal, so that the user can check the other side face to face, the malicious user can be prevented from forging the electronic tag and inducing the first user to join, the leakage of user identity information is caused, and the safety of information processing is improved.
Optionally, referring to fig. 6, fig. 6 is a schematic flow chart of another information processing method provided in an embodiment of the present application, where the information processing method may be applied to a target server side; as shown in fig. 6, the method comprises the steps of:
S301, user identity information of a first user sent by a first terminal is received.
In the embodiment of the application, the target server receives the user identity information of the first user sent by the first terminal. The user identity information of the first user is obtained by the first terminal in response to a confirmation operation for user cluster information, and the user cluster information is obtained based on tag current generated by the electronic tag when the first terminal senses the electronic tag in a target range; the electronic tag is generated based on the user cluster information. In a specific implementation, the process of acquiring the user identity information of the first user may be shown in fig. 2, which is not described herein.
Optionally, the target server may pre-establish user cluster information, so that the subsequent first user joins the user cluster corresponding to the user cluster information. Specifically, the target server may acquire a user cluster creation request sent by the second terminal, and acquire a key pair associated with the user cluster creation request; the key pair comprises a private key, and the user cluster creation request comprises user cluster information; the target server adopts the private key to generate a cluster signature of the user cluster information; and sending the user cluster information and the cluster signature of the user cluster information to a tag management terminal so that the tag management terminal performs tag verification on the user cluster information based on the cluster signature, and outputting an electronic tag based on the user cluster information after the tag verification passes. In a specific implementation, the target server acquires a user cluster creation request sent by the second terminal, and acquires a key pair associated with the user cluster creation request, wherein the key pair comprises a public key and a private key, the private key in the key pair can be adopted to sign user cluster information, a cluster signature of the user cluster information is generated, and the user cluster information and the cluster signature of the user cluster information are sent to the tag management terminal for signature verification. If the verification sign passes, the user cluster information is sent by the target server, and the user cluster information has authenticity; if the verification signature does not pass, the user cluster information is not sent by the target server, and the user cluster information does not have authenticity. By means of signing by using the private key, the fact that the user cluster information is not tampered and the fact that the target server for sending the user cluster information is true is not a malicious terminal can be guaranteed, and therefore the fact that the user cluster information is true can be guaranteed.
Optionally, one way of generating the electronic tag may be to encode the user cluster information, integrate the encoded user cluster information into the electronic tag, and other ways of generating the electronic tag are also feasible. For example, the user cluster information can be written into an initial electronic tag to generate the electronic tag, namely, the user cluster information can be encoded to generate a cluster information code; generating a logic code according to the cluster information code, and sending the logic code to the tag management terminal so that the tag management terminal writes the logic code into the initial tag and outputs the electronic tag. The electronic tag comprises user cluster information. Correspondingly, when the tag management terminal outputs the electronic tag, the logic code can be analyzed to obtain the cluster information code; and decoding the cluster information code to obtain user cluster information, checking the user cluster information by adopting a cluster signature, and writing a logic code into an initial tag by the tag management terminal after the checking is passed, and outputting an electronic tag. Optionally, the tag management terminal may print the electronic tag through the printing device to obtain an electronic tag of the entity, and a worker corresponding to the tag management terminal may send (e.g. mail, etc.) the electronic tag to a second user corresponding to the second terminal, so that the first user may use the first terminal to sense the electronic tag, thereby obtaining user cluster information and joining in a user cluster corresponding to the user cluster information. When the first terminal generates the induction current, the electronic tag can operate a logic code based on the induction current to generate tag current. The first terminal senses the tag current, acquires a tag signal transmitted in the tag current, and decodes the tag signal to obtain user cluster information. In this case, the tag signal may be a cluster information code, or a signal corresponding to the cluster information code in the current.
Optionally, as shown in fig. 7, fig. 7 is a schematic flow chart of establishing user cluster information by the target server, where fig. 7 is a schematic flow chart of establishing user cluster information according to an embodiment of the present application, and the method includes the following steps:
s3011, the second terminal sends a user cluster creation request to the target server.
S3012, the target server acquires a user cluster creation request sent by the second terminal, and acquires a key pair associated with the user cluster creation request.
S3013, the target server uses the private key in the key pair to generate a cluster signature of the user cluster information.
S3014, the target server sends the cluster signature of the user cluster information to the tag management terminal.
S3015, the tag management terminal performs tag verification on the user cluster information based on the cluster signature, and after the tag verification passes, the tag management terminal outputs an electronic tag based on the user cluster information.
S3016, the tag management terminal sends the electronic tag to the second terminal.
In the embodiment of the application, after the private key in the key pair is used for signing the user cluster information, the user cluster information and the user cluster signature are sent to the tag management terminal, so that the user cluster information is not tampered, and the target server for sending the user cluster information has authenticity and is not a malicious terminal, thereby ensuring the authenticity of the user cluster information and further improving the accuracy and the safety of the output electronic tag.
S302, carrying out identity verification on the user identity information of the first user.
In the embodiment of the application, the target server can perform identity verification on the received user identity information of the first user. For example, the target server may verify the authenticity of the user identity information of the first user, determining whether the first user is a student of the class; or the target server can also verify whether the user identity information of the first user is repeatedly added to the class, so that students are prevented from adding to the user cluster by using the identity information of other students in the class.
For example, the target server includes N user management information lists, where N is a positive integer, and the N user management information lists include a target user management information list, and the target user management information list includes information that can be added to a user in a user cluster corresponding to the user cluster information. The user cluster information may carry a cluster tag corresponding to the user cluster information. When the target server acquires the user cluster information, a target user management information list corresponding to the user cluster information can be acquired based on a cluster label corresponding to the user cluster information, and the identity of the user of the first user is verified based on the target user management information list. Specifically, the user cluster information may be searched from the target user management information list, if the user cluster information is found, the first user belongs to the user cluster corresponding to the target user management information list, and the first user may be added to the user cluster; if not, the first user is not included in the user cluster corresponding to the target user management information list. The target user management information list may include a management user, a group member user, etc., where the target user management information list is used to represent user identity information of a user that can join the user group, and may be considered as a preset user list, such as a student information list or an institution member information list. The target user management information list may be shown in table 1, where the number of management users may be one or more, the number of first users may be determined according to the number of users managed by the target user management information list, and in the embodiment of the present application, the number of management users is 1, and the number of cluster member users is 3 as an example.
Table1 list of target user management information
Optionally, the target server may search in the target user management information list based on the user identity information of the first user, and perform identity verification on the user identity information of the first user. Specifically, the target server may find whether the first user is included in the cluster member users in the target user management information list, and if so, the target server indicates that the first user belongs to the user cluster corresponding to the target user management information list, for example, the first user may be a student in the class; if not, the first user is not included in the user cluster corresponding to the target user management information list, for example, the first user is not a student in the class. Optionally, the target user management information list may further include a joined cluster member user, where the joined cluster member user refers to a user who has joined to the user cluster when the first terminal senses the electronic tag, the number of joined cluster member users is less than or equal to the number of cluster member users, if it is determined that the first user belongs to the user cluster, whether the joined cluster member user in the target user management information list includes the first user may also be searched, if not, it indicates that the first user belongs to the user cluster but does not join the user cluster, and user identity information verification of the first user is passed. If the first user is determined to belong to the user cluster and the first user is included in the member users of the joined cluster in the target user management information list, the first user is indicated to belong to the user cluster but is joined to the user cluster, and if the user cluster is joined repeatedly, the user identity information of the first user is not verified.
S303, if the user identity information of the first user passes the verification, the first user is added to the user cluster corresponding to the user cluster information.
In the embodiment of the present application, if the target server verifies that the user identity information of the first user passes, it indicates that the first user belongs to the user cluster, for example, the first user belongs to the class, and if the user identity information of the first user is correct, the first user is added to the user cluster corresponding to the user cluster information. If the target server does not pass the user identity information verification of the first user, the target server indicates that the first user does not belong to the user cluster, for example, the first user does not belong to the class; or the first user belongs to the class but the user identity information is incorrect. For example, another student (not the first user) in the class has joined the user cluster using the user identity information of the first user before the first user joined the user cluster.
Alternatively, the target server may determine whether the user identity information verification for the first user is passed by traversing the set of users included in the user cluster. Specifically, the target server may obtain a user set included in the user cluster, and traverse the user set; the user set comprises one or at least two cluster users and user identity information of each cluster user; if the target server does not find the user identity information of the first user in the user identity information corresponding to one or at least two cluster users respectively, determining that the user identity information of the first user passes verification. If the user identity information of the first user is found in the user identity information corresponding to one or at least two cluster users respectively, determining that the user identity information of the first user is not verified.
For example, the clustered users in the user set and the user identity information of each clustered user include: zhang three, man, 001; plums IV, men and 002; wang wu, girl 003; tang Liu, male, 004; chen Qi, female, 005. If the user identity information of the first user is: xu Ba, male and 006, by traversing the user set, if the user identity information of the first user is not found in the user set, determining that the user identity information of the first user passes the verification. If the user identity information of the first user is: and Li IV, man and 002, by traversing the user set, searching the user identity information of the first user in the user set, and determining that the user identity information of the first user is not verified. By traversing the user set included in the user cluster, it may be determined whether the user identity information of the first user belongs to the user set, thereby determining whether the first user repeatedly joins the user cluster, and if the first user does not repeatedly join the user cluster, the first user may be joined to the user cluster.
S304, if the user identity information of the first user is not verified, generating user identity abnormal information.
In the embodiment of the application, if the target server searches the user identity information of the first user in the user identity information corresponding to one or at least two cluster users respectively, the user identity information verification of the first user is determined not to pass. The user identity abnormality information is used for indicating that the first user belongs to the user cluster, and the user identity abnormality information can include "the user identity information has been added to the class, please carry out information verification". The target server may generate user identity anomaly information that may be represented in any one or more multimedia forms, including but not limited to text, voice, or other forms of information. By traversing the user set included in the user cluster, it may be determined whether the user identity information of the first user belongs to the user set, thereby determining whether the first user repeatedly joins the user cluster, and if the first user is the repeatedly joined user cluster, the target server may generate user identity anomaly information to prompt that the user identity information of the first user is anomalous.
S305, the user identity abnormality information is sent to the first terminal, so that the first terminal sends an identity verification request based on the user identity abnormality information.
In the embodiment of the application, the target server sends the user identity abnormal information to the first terminal so that the first terminal sends the identity verification request based on the user identity abnormal information. If the user identity abnormal information is in a text form, displaying the user identity abnormal information on a display interface corresponding to the first terminal; if the user identity abnormal information is in a voice form, the user identity abnormal information is broadcast through a voice playing device corresponding to the first terminal. The first user can acquire the abnormal user identity information through the first terminal, and then the first terminal can send an identity verification request to the target server to request verification of the user identity information, and the user cluster is rejoined after verification.
Optionally, in the embodiment of the present application, the two-dimensional code may be generated according to the user cluster information and sent to the second terminal, and the first user may use the first terminal to scan the two-dimensional code within the target range, for example, face-to-face scan the two-dimensional code.
In the embodiment of the application, user identity information of a first user sent by a first terminal is received; the user identity information of the first user is obtained by the first terminal in response to a confirmation operation for user cluster information, and the user cluster information is obtained based on tag current generated by the electronic tag when the first terminal senses the electronic tag in a target range; the electronic tag is generated based on the user cluster information; carrying out identity verification on user identity information of a first user; if the user identity information of the first user passes the verification, the first user is added to the user cluster corresponding to the user cluster information. When the user cluster information is created, the user cluster information is encrypted, so that the accuracy of generating the electronic tag is improved, and the user cluster information is prevented from being tampered. And by verifying the user identity information of the first user, repeated addition of user cluster information can be avoided, and the accuracy of information processing is improved. In addition, after the electronic tag is output, the electronic tag is generally arranged at a position which can be seen by a second user due to the short-distance induction of the electronic tag, for example, the electronic tag is arranged at a position which is associated with the second terminal, for example, the electronic tag is stuck on the second terminal, so that the user can check the other side face to face, the malicious user can be prevented from forging the electronic tag and inducing the first user to join in, the leakage of user identity information is caused, and the safety of information processing is improved.
The method of the embodiment of the application is described above, and the device of the embodiment of the application is described below.
Referring to fig. 8, fig. 8 is a schematic diagram showing the composition of an information processing apparatus according to an embodiment of the present application, where the information processing apparatus may be a computer program (including program code) running in a computer device, and for example, the information processing apparatus is an application software; the device can be used for executing corresponding steps in the method provided by the embodiment of the application. The apparatus 80 includes:
The tag sensing module 81 is configured to obtain user cluster information transmitted by the electronic tag through a tag current when the electronic tag is sensed within a target range; the electronic tag is generated based on the user cluster information;
An information obtaining module 82, configured to display the user cluster information, and obtain user identity information of the first user in response to a confirmation operation for the user cluster information;
The information sending module 83 is configured to send the user identity information of the first user to a target server, so that the target server adds the first user to a user cluster corresponding to the user cluster information after the user identity information of the first user passes verification.
Optionally, the tag sensing module 81 includes:
a current generation unit 811 for generating an induced current so that the electronic tag generates a tag current based on the induced current;
and the information decoding unit 812 is configured to receive the tag signal transmitted by the electronic tag through the tag current, and decode the tag signal to obtain the user cluster information.
Optionally, the apparatus 80 further includes:
A record obtaining module 84, configured to obtain, after the first user is added to the user cluster corresponding to the user cluster information, a history operation record of the first user for a target application in a target time period; the history operation record comprises history login time and continuous use time;
a record sending module 85, configured to send the history operation record to the second terminal if the continuous use time period is greater than a first time period threshold and the history login time period is greater than a second time period threshold; the second user associated with the second terminal belongs to the user cluster.
It should be noted that, in the embodiment corresponding to fig. 8, the content not mentioned may be referred to the description of the method embodiment, and will not be repeated here.
The embodiment of the application provides an information processing device, which acquires user cluster information transmitted by an electronic tag through tag current when the electronic tag is sensed in a target range; the electronic tag is generated based on the user cluster information; displaying the user cluster information, and responding to a confirmation operation aiming at the user cluster information to acquire user identity information of a first user; and sending the user identity information of the first user to a target server, so that the target server adds the first user to a user cluster corresponding to the user cluster information after the user identity information of the first user passes verification. In the application, the authenticity of the second user corresponding to the electronic tag can be determined by sensing the electronic tag in the target range, namely, sensing the electronic tag in a short distance, so that the second user corresponding to the electronic tag is prevented from being a malicious user, and when the user identity information of the first user is sent to the target server in the follow-up process, the target server adds the first user to the user cluster corresponding to the user cluster information after the user identity information of the first user passes verification, thereby ensuring the accuracy of the added user identity information. In addition, because the electronic tag is a close-range induction electronic tag, the electronic tag is generally arranged at a position which can be seen by a second user, for example, the electronic tag is arranged at a position which is associated with a second terminal, for example, the electronic tag is stuck on the second terminal, so that the user can check the other side face to face, the malicious user can be prevented from forging the electronic tag and inducing the first user to join, the leakage of user identity information is caused, and the safety of information processing is improved.
Referring to fig. 9, fig. 9 is a schematic diagram showing the composition of another information processing apparatus according to an embodiment of the present application, where the information processing apparatus may be a computer program (including program code) running in a computer device, and for example, the information processing apparatus is an application software; the device can be used for executing corresponding steps in the method provided by the embodiment of the application. The apparatus 90 includes:
An information receiving module 91, configured to receive user identity information of a first user sent by a first terminal; the user identity information of the first user is obtained by the first terminal in response to a confirmation operation for user cluster information, and the user cluster information is obtained based on tag current generated by the electronic tag when the first terminal senses the electronic tag in a target range; the electronic tag is generated based on the user cluster information;
an identity verification module 92, configured to perform identity verification on user identity information of the first user;
the information adding module 93 is configured to add the first user to the user cluster corresponding to the user cluster information if the user identity information of the first user passes the verification.
Optionally, the apparatus 90 further includes:
A request acquisition module 94, configured to acquire a user cluster creation request sent by the second terminal, and acquire a key pair associated with the user cluster creation request; the key pair comprises a private key, and the user cluster creation request comprises the user cluster information;
A signature generation module 95, configured to generate a cluster signature of the user cluster information using the private key;
The signature sending module 96 is configured to send the user cluster information and a cluster signature of the user cluster information to a tag management terminal, so that the tag management terminal performs signature verification on the user cluster information based on the cluster signature, and after the signature verification passes, outputs the electronic tag based on the user cluster information.
Optionally, the signature sending module 96 includes:
An information encoding unit 961, configured to encode the user cluster information to generate a cluster information code;
A code sending unit 962, configured to generate a logic code according to the cluster information code, send the logic code to the tag management terminal, so that the tag management terminal writes the logic code into an initial tag, and output the electronic tag; the electronic tag includes the user cluster information.
Optionally, the authentication module 92 includes:
An identity traversing unit 921, configured to obtain a user set included in the user cluster, and traverse the user set; the user set comprises one or at least two cluster users and user identity information of each cluster user;
The verification passing unit 922 is configured to determine that the user identity information of the first user passes the verification if the user identity information of the first user is not found in the user identity information corresponding to the one or at least two clustered users respectively.
Optionally, the apparatus 90 further includes a verification anomaly module 97, the verification anomaly module 97 includes:
a verification failure unit 971, configured to determine that the user identity information of the first user is not verified if the user identity information of the first user is found in the user identity information corresponding to the one or at least two clustered users respectively;
an information generating unit 972 for generating user identity abnormality information; the user identity abnormality information is used for indicating that the first user belongs to the user cluster;
an anomaly sending unit 973, configured to send the user identity anomaly information to the first terminal, so that the first terminal sends an identity verification request based on the user identity anomaly information.
It should be noted that, in the embodiment corresponding to fig. 9, the content not mentioned may be referred to the description of the method embodiment, and will not be repeated here.
The embodiment of the application provides another information processing device which receives user identity information of a first user sent by a first terminal; the user identity information of the first user is obtained by the first terminal in response to a confirmation operation for user cluster information, and the user cluster information is obtained based on tag current generated by the electronic tag when the first terminal senses the electronic tag in a target range; the electronic tag is generated based on the user cluster information; carrying out identity verification on user identity information of a first user; if the user identity information of the first user passes the verification, the first user is added to the user cluster corresponding to the user cluster information. In the application, when the user cluster information is created, the user cluster information is encrypted, so that the accuracy of generating the electronic tag is improved, and the user cluster information is prevented from being tampered. And by verifying the user identity information of the first user, repeated addition of user cluster information can be avoided, and the accuracy of information processing is improved. In addition, after the electronic tag is output, the electronic tag is generally arranged at a position which can be seen by a second user due to the short-distance induction of the electronic tag, for example, the electronic tag is arranged at a position which is associated with the second terminal, for example, the electronic tag is stuck on the second terminal, so that the user can check the other side face to face, the malicious user can be prevented from forging the electronic tag and inducing the first user to join in, the leakage of user identity information is caused, and the safety of information processing is improved.
Referring to fig. 10, fig. 10 is a schematic diagram of a composition structure of a computer device according to an embodiment of the present application. As shown in fig. 10, the above-mentioned computer device 100 may include: processor 1001, network interface 1004, and memory 1005, and in addition, the above-described computer device 100 may further include: a user interface 1003, and at least one communication bus 1002. Wherein the communication bus 1002 is used to enable connected communication between these components. The user interface 1003 may include a Display (Display), a Keyboard (Keyboard), and the optional user interface 1003 may further include a standard wired interface, a wireless interface, among others. The network interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). The memory 1005 may be a high-speed RAM memory or a nonvolatile memory (non-volatile memory), such as at least one magnetic disk memory. The memory 1005 may also optionally be at least one storage device located remotely from the processor 1001. As shown in fig. 10, an operating system, a network communication module, a user interface module, and a device control application program may be included in the memory 1005, which is one type of computer-readable storage medium.
In the computer device 100 shown in FIG. 10, the network interface 1004 may provide network communication functions; while user interface 1003 is primarily used as an interface for providing input to a user; and the processor 1001 may be used to invoke the device control application stored in the memory 1005 to perform the following operations:
When an electronic tag is sensed in a target range, acquiring user cluster information transmitted by the electronic tag through tag current; the electronic tag is generated based on the user cluster information;
displaying the user cluster information, and responding to a confirmation operation aiming at the user cluster information to acquire user identity information of a first user;
and sending the user identity information of the first user to a target server, so that the target server adds the first user to a user cluster corresponding to the user cluster information after the user identity information of the first user passes verification.
Optionally, the processor 1001 performs the operation of obtaining the user cluster information transmitted by the electronic tag through the tag current, including:
generating an induction current so that the electronic tag generates a tag current based on the induction current;
And receiving a tag signal transmitted by the electronic tag through the tag current, and decoding the tag signal to obtain the user cluster information.
Optionally, the processor 1001 may call the program code to:
After the first user is added to a user cluster corresponding to the user cluster information, acquiring a historical operation record of the first user aiming at a target application in a target time period; the history operation record comprises history login time and continuous use time;
if the continuous use time is longer than a first time threshold and the historical login time is longer than a second time threshold, the historical operation record is sent to a second terminal; the second user associated with the second terminal belongs to the user cluster.
Optionally, the processor 1001 may be configured to invoke a device control application stored in the memory 1005 to:
Receiving user identity information of a first user sent by a first terminal; the user identity information of the first user is obtained by the first terminal in response to a confirmation operation for user cluster information, and the user cluster information is obtained based on tag current generated by the electronic tag when the first terminal senses the electronic tag in a target range; the electronic tag is generated based on the user cluster information;
Carrying out identity verification on the user identity information of the first user;
if the user identity information of the first user passes the verification, the first user is added to the user cluster corresponding to the user cluster information.
Optionally, the processor 1001 may call the program code to:
acquiring a user cluster creation request sent by a second terminal, and acquiring a key pair associated with the user cluster creation request; the key pair comprises a private key, and the user cluster creation request comprises the user cluster information;
generating a cluster signature of the user cluster information by adopting the private key;
And sending the user cluster information and the cluster signature of the user cluster information to a tag management terminal so that the tag management terminal performs tag verification on the user cluster information based on the cluster signature, and outputting the electronic tag based on the user cluster information after the tag verification passes.
Optionally, the processor 1001 performs the operation of sending the user cluster information and the cluster signature of the user cluster information to a tag management terminal, including:
coding the user cluster information to generate a cluster information code;
Generating a logic code according to the cluster information code, and sending the logic code to the tag management terminal so that the tag management terminal writes the logic code into an initial tag and outputs the electronic tag; the electronic tag includes the user cluster information.
Optionally, the processor 1001 performs the operation of authenticating the user identity information of the first user, including:
acquiring a user set included in the user cluster, and traversing the user set; the user set comprises one or at least two cluster users and user identity information of each cluster user;
if the user identity information of the first user is not found in the user identity information corresponding to the one or at least two cluster users respectively, determining that the user identity information of the first user passes the verification.
Optionally, the processor 1001 may call the program code to:
If the user identity information of the first user is found in the user identity information corresponding to the one or at least two cluster users respectively, determining that the user identity information of the first user is not verified;
Generating user identity abnormality information; the user identity abnormality information is used for indicating that the first user belongs to the user cluster;
And sending the user identity abnormality information to the first terminal so that the first terminal sends an identity verification request based on the user identity abnormality information.
In some possible implementations, the processor 1001 may be a central processing unit (central processing unit, CPU), which may also be other general purpose processors, digital signal processors (DIGITAL SIGNAL processors, dsps), application specific integrated circuits (asics), off-the-shelf programmable gate arrays (fpgas) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 1005 may include read only memory and random access memory and provide instructions and data to the processor 1001 and network interface 1004. A portion of the memory 1005 may also include nonvolatile random access memory. For example, the memory 1005 may also store information of the device type.
In a specific implementation, the computer device may execute, through each functional module built in the computer device, an implementation manner provided by each step in fig. 3, 5,6, and 7, and in particular, the implementation manner provided by each step in fig. 3, 5,6, and 7 may be referred to, which is not described herein in detail.
An embodiment of the present application provides a computer device, including: the processor, the memory and the network interface acquire the computer instructions in the memory through the processor, execute the steps of the information processing method and perform information processing operation. In the embodiment of the application, the electronic tag is sensed in the target range, namely the electronic tag is sensed in a short distance, so that the authenticity of the second user corresponding to the electronic tag can be determined, the second user corresponding to the electronic tag is prevented from being a malicious user, when the user identity information of the first user is sent to the target server in the follow-up process, the target server adds the first user to the user cluster corresponding to the user cluster information after the user identity information of the first user is verified, and the accuracy of the added user identity information can be ensured. In addition, because the electronic tag is a close-range induction electronic tag, the electronic tag is generally arranged at a position which can be seen by a second user, for example, the electronic tag is arranged at a position which is associated with a second terminal, for example, the electronic tag is stuck on the second terminal, so that the user can check the other side face to face, the malicious user can be prevented from forging the electronic tag and inducing the first user to join, the leakage of user identity information is caused, and the safety of information processing is improved.
The embodiment of the present application further provides a computer readable storage medium, where the computer readable storage medium stores a computer program, where the computer program includes program instructions, when the program instructions are executed by the processor, can implement the information processing method provided by each step in fig. 3, 5, 6, and 7, and specifically refer to the implementation manner provided by each step in fig. 3, 5, 6, and 7, which is not described herein again. In addition, the description of the beneficial effects of the same method is omitted. For technical details not disclosed in the embodiments of the computer-readable storage medium according to the present application, please refer to the description of the method embodiments of the present application. As an example, the program instructions may be deployed to be executed on one computer device or on multiple computer devices at one site or distributed across multiple sites and interconnected by a communication network.
The computer readable storage medium may be the information processing apparatus provided in any one of the foregoing embodiments or an internal storage unit of the computer device, for example, a hard disk or a memory of the computer device. The computer readable storage medium may also be an external storage device of the computer device, such as a plug-in hard disk, a smart memory card (SMART MEDIA CARD, SMC), a Secure Digital (SD) card, a flash memory card (FLASH CARD), etc. that are provided on the computer device. Further, the computer-readable storage medium may also include both internal storage units and external storage devices of the computer device. The computer-readable storage medium is used to store the computer program and other programs and data required by the computer device. The computer-readable storage medium may also be used to temporarily store data that has been output or is to be output.
Embodiments of the present application also provide a computer program product or computer program comprising computer instructions stored in a computer readable storage medium. The processor of the computer device reads the computer instructions from the computer readable storage medium, and executes the computer instructions, so that the computer device executes the methods provided in the various optional modes in fig. 3, 5, 6 and 7, and the authenticity of the second user corresponding to the electronic tag can be determined by sensing the electronic tag within a target range, namely, sensing the electronic tag in a short distance, so that the second user corresponding to the electronic tag is prevented from being a malicious user, and when the user identity information of the first user is sent to the target server in the follow-up process, the target server adds the first user to the user cluster corresponding to the user cluster information after the user identity information of the first user passes verification, so that the accuracy of the added user identity information can be ensured. In addition, because the electronic tag is a close-range induction electronic tag, the electronic tag is generally arranged at a position which can be seen by a second user, for example, the electronic tag is arranged at a position which is associated with a second terminal, for example, the electronic tag is stuck on the second terminal, so that the user can check the other side face to face, the malicious user can be prevented from forging the electronic tag and inducing the first user to join, the leakage of user identity information is caused, and the safety of information processing is improved.
The terms first, second and the like in the description and in the claims and drawings of embodiments of the application are used for distinguishing between different objects and not for describing a particular sequential order. Furthermore, the term "include" and any variations thereof is intended to cover a non-exclusive inclusion. For example, a process, method, apparatus, article, or device that comprises a list of steps or elements is not limited to the list of steps or modules but may, in the alternative, include other steps or modules not listed or inherent to such process, method, apparatus, article, or device.
Those of ordinary skill in the art will appreciate that the elements and algorithm steps described in connection with the embodiments disclosed herein may be embodied in electronic hardware, in computer software, or in a combination of the two, and that the elements and steps of the examples have been generally described in terms of function in this description to clearly illustrate the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The method and related apparatus provided in the embodiments of the present application are described with reference to the flowchart and/or schematic structural diagrams of the method provided in the embodiments of the present application, and each flow and/or block of the flowchart and/or schematic structural diagrams of the method may be implemented by computer program instructions, and combinations of flows and/or blocks in the flowchart and/or block diagrams. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks. These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or structural diagram block or blocks. These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or structures.
The foregoing disclosure is illustrative of the present application and is not to be construed as limiting the scope of the application, which is defined by the appended claims.

Claims (10)

1. An information processing method, characterized by comprising:
When a first terminal held by a first user senses an electronic tag in a target range, acquiring user cluster information transmitted by the electronic tag through tag current; the electronic tag is generated based on the user cluster information; the target range refers to a distance range where the electronic tag is sensed; the user cluster information comprises an organization name, organization manager information and organization members of an organization; the electronic tag is integrated in a second terminal, the user category to which the first user belongs and the second user associated with the second terminal belong to different user categories, and the authority owned by the second user is greater than the authority owned by the first user; the first user and the second user are face-to-face users;
Displaying the user cluster information, and responding to a confirmation operation aiming at the user cluster information to acquire user identity information of a first user;
And sending the user identity information of the first user to a target server, so that the target server adds the first user to a user cluster corresponding to the user cluster information after the user identity information of the first user is verified.
2. The method of claim 1, wherein the obtaining the user cluster information transmitted by the electronic tag through the tag current comprises:
generating an induced current so that the electronic tag generates a tag current based on the induced current;
And receiving a tag signal transmitted by the electronic tag through the tag current, and decoding the tag signal to obtain the user cluster information.
3. The method according to claim 1, wherein the method further comprises:
After the first user is added to the user cluster corresponding to the user cluster information, acquiring a historical operation record of the first user aiming at a target application in a target time period; the history operation record comprises history login duration and continuous use duration;
If the continuous use time is longer than a first time threshold and the historical login time is longer than a second time threshold, the historical operation record is sent to a second terminal; and the second user associated with the second terminal belongs to the user cluster.
4. An information processing method, characterized by comprising:
Receiving user identity information of a first user, which is sent by a first terminal held by the first user; the user identity information of the first user is obtained by the first terminal in response to a confirmation operation for user cluster information, and the user cluster information is obtained based on a tag current generated by an electronic tag when the first terminal senses the electronic tag in a target range; the electronic tag is generated based on the user cluster information; the target range refers to a distance range where the electronic tag is sensed; the user cluster information comprises an organization name, organization manager information and organization members of an organization; the electronic tag is integrated in a second terminal, the user category to which the first user belongs and the second user associated with the second terminal belong to different user categories, and the authority owned by the second user is greater than the authority owned by the first user; the first user and the second user are face-to-face users;
carrying out identity verification on the user identity information of the first user;
And if the user identity information of the first user passes the verification, adding the first user to the user cluster corresponding to the user cluster information.
5. The method according to claim 4, wherein the method further comprises:
acquiring a user cluster creation request sent by a second terminal, and acquiring a key pair associated with the user cluster creation request; the key pair comprises a private key, and the user cluster creation request comprises the user cluster information;
generating a cluster signature of the user cluster information by adopting the private key;
And sending the user cluster information and the cluster signature of the user cluster information to a tag management terminal so that the tag management terminal performs tag verification on the user cluster information based on the cluster signature, and outputting the electronic tag based on the user cluster information after the tag verification passes.
6. The method of claim 5, wherein the sending the user cluster information and the cluster signature of the user cluster information to a tag management terminal comprises:
Coding the user cluster information to generate a cluster information code;
Generating a logic code according to the cluster information code, and sending the logic code to the tag management terminal so that the tag management terminal writes the logic code into an initial tag and outputs the electronic tag; the electronic tag comprises the user cluster information.
7. The method of claim 4, wherein said authenticating user identity information of said first user comprises:
Acquiring a user set included in the user cluster, and traversing the user set; the user set comprises one or at least two cluster users and user identity information of each cluster user;
If the user identity information of the first user is not found in the user identity information corresponding to the one or at least two cluster users respectively, determining that the user identity information of the first user passes verification.
8. The method of claim 7, wherein the method further comprises:
if the user identity information of the first user is found in the user identity information corresponding to the one or at least two cluster users respectively, determining that the user identity information of the first user is not verified;
generating user identity abnormality information; the user identity abnormality information is used for indicating that the first user belongs to the user cluster;
And sending the user identity abnormality information to the first terminal so that the first terminal sends an identity verification request based on the user identity abnormality information.
9. A computer device, comprising: a processor, a memory, and a network interface;
The processor is connected to the memory, the network interface for providing data communication functions, the memory for storing program code, the processor for invoking the program code to cause the computer device to perform the method of any of claims 1-3 or to perform the method of any of claims 4-8.
10. A computer readable storage medium, characterized in that the computer readable storage medium stores a computer program adapted to be loaded and executed by a processor to cause a computer device having the processor to perform the method of any of claims 1-3 or to perform the method of any of claims 4-8.
CN202110363576.4A 2021-04-02 2021-04-02 Information processing method, computer equipment and readable storage medium Active CN112989310B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110363576.4A CN112989310B (en) 2021-04-02 2021-04-02 Information processing method, computer equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110363576.4A CN112989310B (en) 2021-04-02 2021-04-02 Information processing method, computer equipment and readable storage medium

Publications (2)

Publication Number Publication Date
CN112989310A CN112989310A (en) 2021-06-18
CN112989310B true CN112989310B (en) 2024-04-19

Family

ID=76339133

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110363576.4A Active CN112989310B (en) 2021-04-02 2021-04-02 Information processing method, computer equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN112989310B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101369893A (en) * 2008-10-06 2009-02-18 中国移动通信集团设计院有限公司 Method for local area network access authentication of casual user
CN101730104A (en) * 2009-06-23 2010-06-09 中兴通讯股份有限公司 Method and device for authenticating access of user equipment and wireless local area network access network (WLAN AN)
CN103416040A (en) * 2012-08-29 2013-11-27 华为终端有限公司 Terminal control method, apparatus and terminal
CN103520922A (en) * 2013-09-17 2014-01-22 天脉聚源(北京)传媒科技有限公司 Method, system and device for conducting game control through mobile internet
CN103974269A (en) * 2014-05-15 2014-08-06 丰唐物联技术(深圳)有限公司 Method for establishing Internet of Things through triggering and devices for Internet of Things
CN104104654A (en) * 2013-04-07 2014-10-15 阿里巴巴集团控股有限公司 Method and device for setting Wifi access authority and Wifi authentication
CN104360852A (en) * 2014-10-30 2015-02-18 北京数字天域科技股份有限公司 Application program management method and application program management device of mobile terminal
CN104507088A (en) * 2014-12-22 2015-04-08 上海斐讯数据通信技术有限公司 Wireless network authentication method and system
CN107465662A (en) * 2017-07-04 2017-12-12 深信服科技股份有限公司 Mobile terminal policy management method, mobile terminal and computer-readable recording medium
CN112188458A (en) * 2020-09-29 2021-01-05 深圳市创新佳电子标签有限公司 NFC social software system

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101369893A (en) * 2008-10-06 2009-02-18 中国移动通信集团设计院有限公司 Method for local area network access authentication of casual user
CN101730104A (en) * 2009-06-23 2010-06-09 中兴通讯股份有限公司 Method and device for authenticating access of user equipment and wireless local area network access network (WLAN AN)
CN103416040A (en) * 2012-08-29 2013-11-27 华为终端有限公司 Terminal control method, apparatus and terminal
CN104104654A (en) * 2013-04-07 2014-10-15 阿里巴巴集团控股有限公司 Method and device for setting Wifi access authority and Wifi authentication
CN103520922A (en) * 2013-09-17 2014-01-22 天脉聚源(北京)传媒科技有限公司 Method, system and device for conducting game control through mobile internet
CN103974269A (en) * 2014-05-15 2014-08-06 丰唐物联技术(深圳)有限公司 Method for establishing Internet of Things through triggering and devices for Internet of Things
CN104360852A (en) * 2014-10-30 2015-02-18 北京数字天域科技股份有限公司 Application program management method and application program management device of mobile terminal
CN104507088A (en) * 2014-12-22 2015-04-08 上海斐讯数据通信技术有限公司 Wireless network authentication method and system
CN107465662A (en) * 2017-07-04 2017-12-12 深信服科技股份有限公司 Mobile terminal policy management method, mobile terminal and computer-readable recording medium
CN112188458A (en) * 2020-09-29 2021-01-05 深圳市创新佳电子标签有限公司 NFC social software system

Also Published As

Publication number Publication date
CN112989310A (en) 2021-06-18

Similar Documents

Publication Publication Date Title
CN111080295B (en) Electronic contract processing method and device based on blockchain
KR101883156B1 (en) System and method for authentication, user terminal, authentication server and service server for executing the same
US8613066B1 (en) Techniques for user authentication
CN101356773B (en) Ad-hoc creation of group based on contextual information
CN111833507B (en) Visitor authentication method, device, equipment and computer readable storage medium
CN104767613A (en) Signature verification method, device and system
CN105515783A (en) Identity authentication method, server and authentication terminal
CN111291843B (en) Information acquisition method and system
CN103139179A (en) Multi-channel active type network identity verification system and network identity verification device
CN105830079A (en) Authentication information management system, authentication information management device, program, recording medium, and authentication information management method
CN108092947B (en) Method and device for identity authentication of third-party application
CN112069529B (en) Block chain-based volume management method and device, computer and storage medium
CN109101841A (en) A kind of data processing method, device, system, computer equipment and storage medium
CN112989310B (en) Information processing method, computer equipment and readable storage medium
KR102628504B1 (en) Method and apparatus for providing user profile
US11171967B2 (en) E-code multi-imprints
CN105512208B (en) Information publishing method, device and system
CN113946739A (en) Sensitive data query method, device, equipment and storage medium
CN104660480B (en) A kind of method, apparatus and system of account number abnormality processing
KR102536935B1 (en) Method and apparatus for managing user profile
CN115482132A (en) Data processing method and device for electronic contract based on block chain and server
CN110781523B (en) Method and apparatus for processing information
CN111159746A (en) Learning behavior data storage method and device based on block chain technology
US11594146B2 (en) Agent for online training in an offline environment
CN113572616B (en) Authentication method and device based on distributed bidding platform and related equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40046391

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant